|Publication number||US7383538 B2|
|Application number||US 10/008,864|
|Publication date||Jun 3, 2008|
|Filing date||Dec 6, 2001|
|Priority date||May 15, 2001|
|Also published as||CA2347647A1, US8032868, US20020174416, US20080216054|
|Publication number||008864, 10008864, US 7383538 B2, US 7383538B2, US-B2-7383538, US7383538 B2, US7383538B2|
|Inventors||Cary Lee Bates, Vadim Berestetsky, Paul Reuben Day, John Matthew Santosuosso|
|Original Assignee||International Business Machines Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (7), Referenced by (56), Classifications (9), Legal Events (7)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This invention relates generally to the field of computer programs, and more particularly, relates to storing the states of expressions and variables as a computer process executes, and further having the ability to restore those states.
An important aspect of the design and development of a computer program is debugging intended to locate and identify errors in a computer program under development. Typically, a programmer uses another computer program commonly known as a “debugger” to debug a program under development. Conventional debuggers typically support two primary operations to assist a computer programmer. A first operation supported by conventional debuggers is a “step” function which permits a computer programmer to process instructions, also known as “statements”, one at a time in a computer program and see the results of each instruction upon completion. While the step operation provides a programmer with a large amount of information about a program during its execution, stepping through hundreds or thousands of program instructions can be extremely tedious and time consuming. The programmer may be required to step through many program instructions that are already known to be error-free before a set of instructions to be analyzed are executed.
To address this difficulty, a second operation supported by conventional debuggers is a breakpoint operation, which permits a computer programmer to identify a break point. A break point is a precise instruction at which execution of a computer program is halted. As a computer program is executed by a debugger, the program executes in a normal fashion until a breakpoint is reached, stops execution, and displays the results of the computer program to the programmer for analysis.
Step operations and breakpoints are typically used together to simplify the debugging process. Specifically, a common debugging operation is to set a breakpoint at the beginning of a desired set of instructions to be analyzed, and then begin execution of the program undergoing debugging. Execution halts at a breakpoint and the programmer then steps through the desired set of instructions line-by-line using the step operation. Consequently, a programmer is able to quickly isolate and analyze a particular set of instructions without having to step through irrelevant portions of a computer program.
Most breakpoints supported by conventional debuggers are unconditional meaning that once such a breakpoint is reached, execution of the program is always halted. Some debuggers also support the use of conditional breakpoints, which only halt execution of a program when a variable used by the program is set to a predetermined value at the time such a breakpoint is reached. One significant drawback to conventional breakpoints results from the fact that some instructions in a computer program are executed fairly often for different purposes, and may result in many needless stoppages before a desired stoppage is encountered. This problem is especially pronounced in object-oriented programming (OOP) and other highly modular languages where a single general purpose portion of a computer program may be executed in a number of different situations for different purposes.
With an object-oriented programming language, for example, a program is constructed from a number of “objects,” each of which includes data and/or one or more sets of instructions, often referred to as routines or methods that define specific operations that can be performed on the data. A large number of objects may be used to build a computer program with each object interacting with other objects in the computer program to perform desired operations. When one object invokes a particular routine in another object, the former object is often said to be calling the routine in the latter object. Some general purpose objects in a computer program may support basic operations, e.g., displaying information to a user, printing information on a printer, storing or retrieving information from a database, etc. Particularly, these generic type of objects are called by many different objects so that placing a conventional breakpoint in a routine of one of these common generic objects will result in hundreds of unwanted stoppages prior to occurrence of a desired stoppage. Thus, context sensitive breakpoints can be set in certain debuggers to retrieve the sequence of routines in the computer program that are called just prior to reaching the breakpoint, such as in U.S. Pat. No. 6,077,312 entitled “Apparatus, Program Product and Method of Debugging Utilizing a Context Sensitive Breakpoint” issued 20, Jun. 2000, commonly owned by the assignee and herein incorporated by reference in its entirety. Context sensitive breakpoints locate the specific calls in other objects that relate to the desired stoppage in a particular object. This eliminates the extremely time consuming and tedious task of setting each breakpoint and eliminates the risk that not all relevant calls are located so not all desired circumstances for inducing stoppages may be recognized during debugging.
But, setting breakpoints and halting execution of a program undergoing debugging is still onerous. Significant time is spent going through the breakpoints, whether the breakpoints are general or are context specific, as above. Merely watching breakpoints, moreover, does not solve the problem of determining the dynamics of an executing program in which variables and other expressions stored in a memory location may constantly change. These changing variables, moreover, may have either a direct or an indirect impact on other variables and other computer expressions. The state of the art of debugging and trace programs, therefore, simply does not permit a dynamic program to continue to execute while recording only the impact of the program's execution resulting from changes of state of specified computer expressions.
Therefore, a significant need continues to exist for an improved manner of debugging computer programs, specifically in the area of identifying specific variables or memory locations which are used by the program undergoing debugging, and being able to restore the state of those memory locations at different points in the program.
These needs and others that will become apparent to one skilled in the art are satisfied by a method of tracing the activity of an expression, comprising the steps of: specifying a machine-implemented process in which a trigger expression is to be traced; specifying the trigger expression to be traced in the machine-implemented process; storing the state of the trigger expression when it is active within the machine-implemented process without interrupting the process; and restoring the state of the trigger expression when requested.
A condition may be imposed onto the trigger expression such that the state of the trigger expression is stored only when the condition is satisfied. In any event, the step of storing the state of the trigger expression may comprise creating a history of the trigger expression which is all the different states of the trigger expression whenever it was active. The history may be displayed such that the state of the trigger expression each time the trigger expression was active can be displayed separately.
The trigger expression is one which results in an L value during the machine-implemented process. The activity may be a call to a memory location of the trigger expression, such as a Read and/or a Write.
Attached expressions may be specified such that the state of the attached expressions, if any, are also stored when the trigger expression is active; and the state of the attached expressions may be restored when requested.
The machine-implemented process may be a computer program, such as included in an object level trace program. The computer program may also be included in a debug program.
The invention may also be a method of tracing the activity of an expression in an executing computer program, comprising the steps of: specifying the computer program and specifying a trigger expression resulting in an L value and any optional attachment expressions which are to be traced during the execution of the computer program; imposing a condition onto the trigger expression; storing the state of the trigger expression and any optional attachment expressions when the computer program has accessed a location in memory pertaining to the trigger expression and the conditions are satisfied to create a snapshot, the step of storing accomplished without interrupting the process; creating a profile of the trigger expression comprising storing each snapshot; displaying the profile such that each snapshot can be displayed separately; and restoring the state of each snapshot, when requested.
The invention is also a tracing device, comprising: a memory functionally connected to the digital logic device capable of executing a sequence of instructions; a program to monitor the activity of an expression during the execution of the sequence of instructions; a snapshot of the state of the expression every time the expression is active during the execution of the sequence of instructions; a history stored in the memory, the history being a plurality of snapshots; a state restorer which restores the state of the expression in a snapshot; and a user interface by which a user may interact with the program, a snapshot, and the history. The tracing device may be incorporated into an debug program to debug the sequence of instructions; or into an object trace program. The tracing device may further comprise an attachment expression profiler which stores the state at least one attachment expression with each snapshot. The tracing device and the digital logic device may be incorporated into the same computer; alternatively, they may be separate units connected by a data communications link.
The invention may also be considered a processing device to trace the activity of an expression in a computer device, comprising: a processor; a memory functionally connected to the processor; a first computer program executing by the processor in which the expression is active; a second computer program to trace the activity of the expression within the memory during the execution of first computer program; a snapshot which stores the state expression every time the expression is active during the execution of the first computer program; an attachment expression profiler which stores the state at least one attachment expression with each snapshot; a history stored in the memory, the history being a plurality of snapshots; a display unit to display the history to a user; and an input device by which the user can input the expression to be traced.
The invention may also be a profiler to record the profile of a particular expression/variable within a program executing within a logical processing device, the profiler comprising: means to choose the particular expression/variable in a program executing within the logical processing device; means to record a snapshot of the particular expression/variable whenever the program addresses a memory location of the particular expression/variable without interrupting the program; means to collect a plurality of snapshots into a profile of the particular expression/variable, each snapshot corresponding to each time the program addressed the memory location of the particular expression/variable; and means to display the profile of the particular expression/variable. There may also be means to set at least one attachment expression active within the program; means to record the state of the at least one attachment expression whenever a snapshot of the particular expression/variable is taken; means to attach each state of the at least one attachment expression to the snapshot of the particular expression/variable when taken; and means to display the profile of the at least one attachment expression to a user. The profiler may further have means to delete the profile; and/or means to change the particular expression/variable; and/or means to change the at least one attachment expression.
The invention also embodies a program of machine readable instructions executable by an electronic processing apparatus to perform method steps for operating an electronic processing apparatus, the program comprising the steps of: initiating a user interface to exchange data input/output with a user and an electronic processing apparatus; requesting a trigger expression from a user; requesting a program identification of a program in which the trigger expression is to be traced during the program's execution; storing the state of the trigger expression each time a memory operation occurs to the trigger expression during the execution of the identified program without interrupting or otherwise stopping execution of the identified program as a snapshot; and maintaining the capability to restore each snapshot and display each snapshot to the user. The user may further be requested to assign conditions to the trigger expression whereupon when the conditions are satisfied, the snapshot is stored. Further, the user may be requested to indicate an attached expression whose states are also stored in a corresponding snapshot whenever a snapshot is stored.
The novel features believed characteristic of the invention are set forth in the claims. The invention itself, however, as well as a preferred mode of use, objects and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying Drawing, wherein:
Referring to the Drawing, wherein like numbers denote like parts throughout the several views,
Client computer 20, which may be similar to computers 12, 14, may include a central processing unit (CPU) 21; a number of peripheral components such as a computer display 22; a storage device 23; a printer 24; and various input devices, e.g., a mouse 26 and keyboard 27, among others. Server computer 16 may be similarly configured, albeit typically with greater processing performance and storage capacity, as is well known in the art.
Computer 30 typically includes at least one processor 31 coupled to a memory 32. Processor 31 may represent one or more processors or microprocessors, and memory 32 may represent the random access memory (RAM) devices comprising the main storage of computer 30, as well as any supplemental levels of memory, e.g., cache memories, nonvolatile or backup memories, programmable or flash memories, read-only memories, etc. In addition, memory 32 may be considered to include memory storage physically located elsewhere in computer 30, e.g., any cache memory in a processor 31, as well as any storage capacity used as a virtual memory, e.g., as stored on a mass storage device 36 or on another computer coupled to computer 30 via network 38.
Computer 30 also typically receives a number of inputs and outputs for communicating information externally. For interface with a user or operator, computer 30 typically includes one or more user input devices 33, e.g., a keyboard, a mouse, a trackball, a joystick, a touchpad, and/or a microphone, among others, and a display 34 such as a CRT monitor, an LCD display panel, and/or a speaker, among others. It should be appreciated, however, that with some implementations of computer 30, e.g., some server implementations, direct user input and output may not be supported by the computer.
For additional storage, computer 30 may also include one or more mass storage devices 36, e.g., a floppy or other removable disk drive, a hard disk drive, a direct access storage device (DASD), an optical drive e.g., a CD drive, a DVD drive, etc., and/or a tape drive, among others. Furthermore, computer 30 may include an interface with one or more networks 38, e.g., a LAN, a WAN, a wireless network, and/or the Internet, among others, to permit the communication of information with other computers coupled to the network. It should be appreciated that computer 30 typically includes suitable analog and/or digital interfaces between processor 31 and each of components 32, 33, 34, 36 and 38 as is well known in the art.
Computer 30 operates under the control of an operating system 40, and executes various computer software applications, components, programs, objects, modules, etc., such as an executable program 42, a calling stack 44, a debugger 50, among others. The debugger software application 50 is resident in memory 32 for the purpose of debugging one or more executable computer programs, e.g., executable program 42. A calling stack 44 associated with executable program 42 is utilized by operating system 40 during the execution of program 42. These and other various applications, components, programs, objects, modules, etc. may also execute on one or more processors in another computer coupled to computer 30 via a network 38, e.g., in a distributed or client-server computing environment, whereby the processing required to implement the functions of a computer program may be allocated to multiple computers over a network.
In general, the routines executed to implement the embodiments of the invention, whether implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions will be referred to herein as computer programs or simply programs. The computer programs typically comprise one or more instructions that are resident at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause that computer to perform the steps necessary to execute steps or elements embodying the various aspects of the invention.
While the invention has and hereinafter will be described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments of the invention are capable of being distributed as a program product in a variety of forms, and that the invention applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of signal bearing media include but are not limited to recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks, e.g., CD-ROM's, DVD's, etc., among others, and transmission type media such as digital and analog communication links. In addition, various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature. The exemplary environments illustrated in
Routines, often referred to as methods, procedures, and functions, are typically sequences of instructions or statements in a computer program that may be invoked to perform predetermined operations on a computer. The calling history for a computer program is typically maintained by an operating system using a data structure such as a calling stack that maintains information regarding the sequence of routines that are called during the execution of the computer program. A calling stack is a first in-first out (FIFO) data structure. In response to a routine call from a first routine to a second routine, an operating system will generally “push” onto the top of the calling stack an entry that identifies both the first routine, as well as the specific instruction or statement in that routine from which the routine call was made or, alternatively, the instruction or statement in that routine to which control should be returned upon completion of the second routine. The second routine is then executed, and if that routine calls an additional routine, an entry relating to that routine call is also added to the stack. As routines terminate in execution, entries from the calling stack are then “popped” from the top of the stack and the information therein analyzed to determine the routine and instruction therein where control should be returned.
In accordance with features of the invention, as will be described, greater freedom and flexibility is granted to the computer programmer so she/he can indicate a trigger variable/expression whose state is saved every time the trigger variable is active within the program, more specifically whenever an executed instruction changes or addresses the state of the trigger variable/expression. When the user specifies a trigger variable or expression, a special watch breakpoint is set to that variable/expression. When the trigger variable/expression is active or otherwise addressed during program execution, execution is not stopped but rather features of the inventive process herein are triggered to store the point in the program at which the activity occurred, the variable's/expression's values and/or selected attributes, referred to as a snapshot. The user may further specify additional variables/expressions and execution attributes to be attached to the trigger variable/expression whose states are also saved in the snapshot.
In the preferred embodiment, the features of the invention herein will be incorporated in a debugger program; alternatively, however the process and features of the invention as described herein can also be a stand-alone computer program which will record a history of a computer expression through an executing computer program or process. The variable anchor history 310 is preferably stored in the RAM and could easily be saved and stored to main memory. Among the features of the variable anchor history 310 include the trigger variable's name 312. Represented here as a variable with the name “A”, the invention is actually intended to cover an activity to an addressable memory location used by a computer program; hence the inventive process herein is expanded to include computer expressions resulting in an L value, i.e., a value that can be expressed as being left of an equal sign in a logical or arithmetic expression. Examples of expressions may include an array element, a pointer expression, a substring expression, etc., as well as variables.
Also stored in the history table 310 are three choices of memory operation, as an example of an activity, which had been performed on the trigger variable/expression 312. Reference is a matter of just referring to the memory address associated with the variable/expression A; Write means that the program writes a value to the memory location of A; and Read/Write means that the program reads from or writes to the memory location of A.
The attached variables that the user specified may be further stored in the history table 310; attached variables C 316 c, D 316 d, and E 316 e are examples of other variables/expressions whose state can be stored and restored when an event happens to a trigger variable/expression. Section 350 of the history table 310 contains the tables of occurrences in which the trigger variable/expression A has been referenced or written or read by the program undergoing the tracing and/or the state history of the trigger variable/expression and/or one or several of the attached variables/expressions C, D, and/or E has been saved.
One such table of occurrences 350 is shown in
Specific information shown in the graphical user interface of
Below the block of the Stacks 426 are three additional tabs used to switch between the following panels: History 434, the Locals 436, and Storage 438. Storage allows the user to monitor contents of the storage for the computer process under debug. Locals displays variables that are local for each individual thread. The History panel 442 has been selected and the history of the expression A as it was referenced during the execution of the program PGM1 is displayed. History 442 shows a listing of three snapshots 444 a, 444 b, 444 c. Again, a snapshot refers to the execution state of the program at a specific statement in the program at which the trigger variable/expression was referenced. During the execution of the PGM1, the expression A was referenced three times: SnapShot1 444 a occurred on line 28 of program PGM1; SnapShot2 444 b occurred on line 83 of PGM2; and SnapShot3 444 c occurred on line 51 of PGM1.
To the right in
If the trigger variable/expression is referenced very frequently throughout the program under inspection, taking snapshots for every such reference might become somewhat costly. In such scenarios the user quite often knows specific conditions that cause a problem in question, e.g., certain range for the loop index, or certain values for the variable/expression, such as A>900, A is True, etc. She/he may limit the number of snapshots taken by identifying such conditions and entering them in the “Conditions to take snapshots” field in block 526. The graphical user interface 510 further allows the user to indicate if she/he wishes the program to include attachment environments, such as local variables, registers, storage contents, etc. as in block 528; to take snapshots on a variable read as in block 530; and/or to record the call stack as in block 532. Then, as is common with graphical user interfaces, the user may then enable the program to accept the input as in OK, block 534; to CANCEL as in block 536; or to APPLY as in block 538.
In step 614, however, if the user does not wish to establish or collect the history of a trigger variable/expression as it is traced through a program, then in step 630, the process inquires if the user wishes to suspend tracing a particular variable through the program. If the response is no, the program determines if the user wishes to delete the history associated with a trigger variable/expression as in step 632. If the response is to delete the history then in step 634 the trigger and the attached variables'/expressions' history and snapshots or table of occurrences, as shown in
If, however, in step 632, the action is not to delete a variable's/expression's history, then in step 640, there is an option to restore the state of the trigger variable/expression and any attached variables/expressions, a unique feature of the invention herein. First, the restore flag is set in step 642. Then in step 644, the entry is saved. In step 646, the execution of the program is set to the line where a breakpoint occurred, as in line 51 shown in
In step 640, if the action is not to restore the state of a trigger variable/expression, the process inquires next if the action is to display the variable's/expression's values, as in step 650. If so, then the variable's/expression's history is displayed in step 652. Otherwise, normal or alternative debugging operations may proceed as in step 654.
In step 714, if the history of a trigger variable/expression is not to be stored, then in step 720, the watch is handled in the normal way and the process returns, as in step 790.
If, during the execution of the program to be debugged, the program has not hit a watchpoint in step 712, the process checks to see if the program has executed a statement indicated as a breakpoint, as in step 730. If not, then in step 732, normal hook function processing occurs and the process returns in step 790. If, in step 730, a breakpoint has occurred and execution of the program continues, then in step 740, the process inquires if the restore flag has been set (step 642). If the restore flag has not been set, then normal breakpoint processing occurs in step 760. If, however, the restore flag was set, then in step 750, the process determines if the breakpoint is at the same location as the restore entry set in step 644. If so, then in step 752, the states of the trigger variable/expression and all attached variables/expressions are restored and stored in the history table. In step 754, the restore flag is removed and the breakpoint is removed and normal breakpoint processing ensues, as in step 760. If, however, in step 750, the breakpoint is not at the same location as the entry to be restored, then in step 756, the breakpoint is ignored and the process returns, as in step 790.
Thus, what has been disclosed is a method to trace a trigger variable/expression and user-selected attached variables/expressions such that when the trigger variable/expression being traced changes state, the state(s) of the trigger variable/expression and the attached variables/expressions are also saved, thus creating a snapshot. Storing the snapshot allows a programmer to restore the state of the trigger variable/expression to the program statements at which it changed or when its memory location was referenced. By restoring the values of the attached variables/expressions, the user can approximate the environment at the time that the change was made to the trigger variable/expression. This allows the user to essentially back up in time and debug the program. By choosing the right attached variables/expressions, whether they all be local variables or others, the programmer can put herself/himself right back into the situation where the problem appeared without having to reexcute the program.
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example and not limitation and that variations are possible. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5140671 *||Nov 6, 1991||Aug 18, 1992||International Business Machines Corporation||Expert system debugger|
|US5896536 *||May 1, 1996||Apr 20, 1999||International Business Machines Corp.||Data triggered trace support for debugging object oriented programs|
|US6282701 *||Jul 30, 1998||Aug 28, 2001||Mutek Solutions, Ltd.||System and method for monitoring and analyzing the execution of computer programs|
|US6311326 *||Jan 4, 1999||Oct 30, 2001||Emc Corporation||Online debugging and tracing system and method|
|US6493868 *||Nov 2, 1999||Dec 10, 2002||Texas Instruments Incorporated||Integrated development tool|
|US6510507 *||Mar 3, 2000||Jan 21, 2003||Texas Instruments Incorporated||Page address look-up range ram|
|US20020147965 *||Feb 1, 2001||Oct 10, 2002||Swaine Andrew Brookfield||Tracing out-of-order data|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7636913 *||Jun 22, 2005||Dec 22, 2009||Microsoft Corporation||System and method for evaluating an expression in a debugger|
|US7653899||Jul 23, 2004||Jan 26, 2010||Green Hills Software, Inc.||Post-execution software debugger with performance display|
|US7840533||Apr 30, 2009||Nov 23, 2010||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US8015552||Jul 23, 2004||Sep 6, 2011||Green Hills Software, Inc.||Post-execution software debugger with coverage display|
|US8069439 *||Mar 30, 2006||Nov 29, 2011||Microsoft Corporation||Framework for modeling continuations in workflows|
|US8132159||Jul 23, 2004||Mar 6, 2012||Green Hills Software, Inc.||Post-execution software debugger with event display|
|US8136096||Jul 23, 2004||Mar 13, 2012||Green Hills Software, Inc.||Backward post-execution software debugger|
|US8140794||Jan 18, 2011||Mar 20, 2012||Commvault Systems, Inc.||Snapshot storage and management system with indexing and user interface|
|US8271955 *||Jul 23, 2004||Sep 18, 2012||Green Hille Software, Inc.||Forward post-execution software debugger|
|US8433682||Dec 27, 2010||Apr 30, 2013||Commvault Systems, Inc.||Systems and methods for analyzing snapshots|
|US8433872||Mar 20, 2012||Apr 30, 2013||Commvault Systems, Inc.||Snapshot storage and management system with indexing and user interface|
|US8442944||Sep 30, 2011||May 14, 2013||Commvault Systems, Inc.||System and method for generating and managing quick recovery volumes|
|US8583594||Sep 14, 2012||Nov 12, 2013||Commvault Systems, Inc.||System and method for performing integrated storage operations|
|US8584097||Feb 13, 2012||Nov 12, 2013||Green Hills Software, Inc.||Post-execution software debugger with event display|
|US8595191||Dec 27, 2010||Nov 26, 2013||Commvault Systems, Inc.||Systems and methods for performing data management operations using snapshots|
|US8645320||May 24, 2012||Feb 4, 2014||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US8655846||May 14, 2013||Feb 18, 2014||Commvault Systems, Inc.||System and method for generating and managing quick recovery volumes|
|US8719767||Mar 31, 2011||May 6, 2014||Commvault Systems, Inc.||Utilizing snapshots to provide builds to developer computing devices|
|US8789023||Mar 7, 2012||Jul 22, 2014||Green Hills Software, Inc.||Backward post-execution software debugger|
|US8819641 *||Apr 27, 2006||Aug 26, 2014||Epic Games, Inc.||Program state reversing software development tool|
|US8886595||Dec 23, 2013||Nov 11, 2014||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US8898411||Apr 29, 2013||Nov 25, 2014||Commvault Systems, Inc.||Snapshot storage and management system with indexing and user interface|
|US8914777||Aug 20, 2012||Dec 16, 2014||Green Hills Software||Forward post-execution software debugger|
|US8959299||Sep 14, 2009||Feb 17, 2015||Commvault Systems, Inc.||Using a snapshot as a data source|
|US9092500||Mar 10, 2013||Jul 28, 2015||Commvault Systems, Inc.||Utilizing snapshots for access to databases and other applications|
|US9176848 *||Jul 28, 2014||Nov 3, 2015||International Business Machines Corporation||Program debugger and program debugging|
|US9208160||Oct 9, 2014||Dec 8, 2015||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US9268602||Nov 18, 2013||Feb 23, 2016||Commvault Systems, Inc.||Systems and methods for performing data management operations using snapshots|
|US9298559||Apr 30, 2013||Mar 29, 2016||Commvault Systems, Inc.||Systems and methods for analyzing snapshots|
|US9298715||Mar 6, 2013||Mar 29, 2016||Commvault Systems, Inc.||Data storage system utilizing proxy device for storage operations|
|US9336121 *||Mar 15, 2013||May 10, 2016||International Business Machines Corporation||Capture and display of historical run-time execution traces in a code editor|
|US9342436 *||Aug 9, 2013||May 17, 2016||International Business Machines Corporation||Capture and display of historical run-time execution traces in a code editor|
|US9342537||Mar 6, 2013||May 17, 2016||Commvault Systems, Inc.||Integrated snapshot interface for a data storage system|
|US9405631||Oct 30, 2015||Aug 2, 2016||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US9448731||Nov 14, 2014||Sep 20, 2016||Commvault Systems, Inc.||Unified snapshot storage management|
|US9465721||Aug 19, 2013||Oct 11, 2016||Microsoft Technology Licensing, Llc||Snapshotting executing code with a modifiable snapshot definition|
|US9471578||Dec 19, 2013||Oct 18, 2016||Commvault Systems, Inc.||Data storage system utilizing proxy device for storage operations|
|US9495251||Jan 24, 2014||Nov 15, 2016||Commvault Systems, Inc.||Snapshot readiness checking and reporting|
|US9619341||Jun 29, 2016||Apr 11, 2017||Commvault Systems, Inc.||System and method for performing an image level snapshot and for restoring partial volume data|
|US9632874||Jan 24, 2014||Apr 25, 2017||Commvault Systems, Inc.||Database application backup in single snapshot for multiple applications|
|US9639426||Jan 24, 2014||May 2, 2017||Commvault Systems, Inc.||Single snapshot for multiple applications|
|US20070011515 *||Jun 22, 2005||Jan 11, 2007||Microsoft Corporation||System and method for evaluating an expression in a debugger|
|US20070078538 *||Sep 29, 2006||Apr 5, 2007||Omron Corporation||Debug device|
|US20070094540 *||Jan 26, 2006||Apr 26, 2007||Fujitsu Limited||Program analysis program, program analysis device, and program analysis method|
|US20070220327 *||Sep 26, 2006||Sep 20, 2007||Evergrid, Inc., A Delaware Corporation||Dynamically Controlled Checkpoint Timing|
|US20070239499 *||Mar 30, 2006||Oct 11, 2007||Microsoft Corporation||Framework for modeling continuations in workflows|
|US20090240748 *||Apr 30, 2009||Sep 24, 2009||Anand Prahlad||System and method for performing an image level snapshot and for restoring partial volume data|
|US20100070726 *||Sep 14, 2009||Mar 18, 2010||David Ngo||Using a snapshot as a data source|
|US20110131187 *||Jan 18, 2011||Jun 2, 2011||Commvault Systems, Inc.||Snapshot storage and management system with indexing and user interface|
|US20110161295 *||Dec 27, 2010||Jun 30, 2011||David Ngo||Systems and methods for analyzing snapshots|
|US20110161299 *||Dec 27, 2010||Jun 30, 2011||Anand Prahlad||Systems and methods for performing data management operations using snapshots|
|US20110212549 *||May 13, 2010||Sep 1, 2011||Chen Kong C||Apparatus and method for predetermined component placement to a target platform|
|US20140282386 *||Mar 15, 2013||Sep 18, 2014||International Business Machines Corporation||Capture and display of historical run-time execution traces in a code editor|
|US20140282388 *||Aug 9, 2013||Sep 18, 2014||International Business Machines Corporation||Capture and display of historical run-time execution traces in a code editor|
|US20150033211 *||Jul 28, 2014||Jan 29, 2015||International Business Machines Corporation||Program debugger and program debugging|
|US20150052400 *||Aug 19, 2013||Feb 19, 2015||Concurix Corporation||Breakpoint Setting Through a Debugger User Interface|
|U.S. Classification||717/128, 714/E11.21, 714/39, 714/45|
|International Classification||G06F9/44, G06F11/00, G06F11/36|
|Dec 6, 2001||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BATES, CARY LEE;BERESTETSKY, VADIM;DAY, PAUL REUBEN;AND OTHERS;REEL/FRAME:012379/0410;SIGNING DATES FROM 20010814 TO 20011010
|Jan 16, 2012||REMI||Maintenance fee reminder mailed|
|Jun 3, 2012||SULP||Surcharge for late payment|
|Jun 3, 2012||FPAY||Fee payment|
Year of fee payment: 4
|Jan 15, 2016||REMI||Maintenance fee reminder mailed|
|Jun 3, 2016||LAPS||Lapse for failure to pay maintenance fees|
|Jul 26, 2016||FP||Expired due to failure to pay maintenance fee|
Effective date: 20160603